false report
Recently Published Documents


TOTAL DOCUMENTS

44
(FIVE YEARS 4)

H-INDEX

4
(FIVE YEARS 0)

2021 ◽  
Vol 15 (1) ◽  
pp. 23-56
Author(s):  
Alan S. Weakley ◽  
Derick B. Poindexter ◽  
Hannah C. Medford ◽  
Alan R. Franck ◽  
Keith A. Bradley ◽  
...  

As part of ongoing efforts to understand, document, and conserve the flora of southeastern North America, we propose two new species, the recognition of a usually synonymized variety, the acceptance of two species of Waltheria as being present in peninsular Florida, taxonomic acceptance of a sometimes deprecated species transferred with a new name into a different genus, and we clarify the distribution and ecology of a species. In Carex (Cyperaceae), we re-analyze infrataxa in Carex intumescens and recommend the recognition of two varieties, a taxonomic schema first proposed in 1893, but usually not followed in the 128 years since. In Euphorbia (Euphorbiaceae), a careful assessment of south Florida material of Euphorbia subg. Chamaesyce sect. Anisophyllum subsect. Hypericifoliae reveals the need for taxonomic changes to best classify endemic representatives of this group, resulting in the naming of a new species, and a new name at species rank in Euphorbia for a taxon first named in Chamaesyce and sometimes subsequently treated at only varietal rank in Euphorbia. Chamaecrista deeringiana (Fabaceae, subfamily Caesalpinioideae) has been repeatedly misinterpreted to include two different and disjunct population systems with differing morphologies and habitats, which are here interpreted as separate species, one newly named and the other Chamaecrista deeringiana returned to its original and narrower interpretation as a south Florida endemic. Waltheria (Malvaceae) has sometimes been interpreted as being represented in Florida by a single taxon, Waltheria indica, but we disentangle the concepts of the widespread W. indica and the West Indian W. bahamensis and clarify that both are present in the southeastern United States. We reconsider the occurrence and habitat of Toxicoscordion nuttallii (Melanthiaceae) in three states in which it has been reported as a rare species, Mississippi, Missouri, and Louisiana, and remove it from the Mississippi flora as a garbled and false report. In Louisiana, its occurrence in calcareous prairie complexes limits its potential occurrence in the state to a specialized and rare habitat, but careful exploration of habitat remnants may result in the discovery of additional populations. Taxonomic studies and re-assessments of this kind are critical in laying the best scientific foundation for regulatory, policy, and land conservation decisions. This paper names or makes the case for the renewed acceptance of six species with range-wide conservation concern: one Critically Imperiled (G1 – Euphorbia ogdenii), one Imperiled (G2 – E. hammeri), and four Vulnerable (G3 – E. garberi, E. porteriana, Chamaecrista deeringiana, C. horizontalis).


Author(s):  
Ganna Sobko

The author examines topical aspects of specifying mental violence in the criminal legislation of Ukraine on the basis of Articles from the Section «Crimes against Public Security», namely «Banditry», «Terrorist Acts», «Intentionally False Report about a Threat to Public Security, or a Threat of Property Destruction or Damage». Special attention is paid to the empirical data collected on the basis of indicators of the Prosecutor General’s Office of Ukraine, the guilty verdicts of the courts of Ukraine under the above-mentioned Articles. On this basis, the author specifies objective attributes of the presence of mental violence in the above-mentioned crimes, analyzes their significance and, using the cases of court verdicts, proves the presence of mental violence. Mental violence is expressed through the use of the following terminology: coercion, compulsion, involvement, threats, recruitment, use of weapons, exerting psychological pressure against the victim, threat (of explosion, arson or other actions terrorizing the population, posing danger of human death, considerable damage to property or other grave consequences). The author has analyzed and presented the percentage ratio of all crimes under consideration and, using the conducted analysis, has developed recommendations on supplementing the formal components constituting these crimes with a compulsory object of the mental health of the population. Besides, having assessed the cumulative data from the survey of police officers whose work is connected with crime investigation, the author concludes that, within the framework of crimes against public security, such criminal means as involvement and coercion are varieties of mental violence which, through psychological influence, change a person’s mentality and behavior. To improve the professional competence of investigators in the spheres of psychology, criminal law and criminology, the author suggests developing for investigators an algorithm of actions for identifying mental violence in crimes against public security.


2021 ◽  
Author(s):  
Tamina Preuß

Fake news as a danger to society have been in the focus of public and scientific interest since the election of Donald Trump as the 45th President of the USA. The media report on fake news every day. Currently, there are the false report that 600 baby corpses have been washed ashore in the German flood areas and deliberately circulated fake news about the candidate for chancellorship Armin Laschet. The study highlights the potential danger of fake news. It shows that the current protection under criminal law covers only a small section of the cases of fake news that are worthy of punishment. To improve the protection under criminal law, the author makes a reform proposal.


2020 ◽  
Vol 21 (1) ◽  
pp. 92-105
Author(s):  
D. Puchko

Problematic issues of forensic structural engineering as a source of evidence while criminal proceedings in the aspect of evaluating its results have been analyzed. Taking into account the relevance of this type of forensic examination both for the investigation of criminal proceedings and for other types of court proceedings, main provisions concerning evaluation of a forensic report in the field of forensic structural engineering are considered. Relevant norms of the Criminal Procedure Code of Ukraine and of some foreign countries have been studied. It is concluded that, in fact, the approaches to the preparation of forensic report content are similar to the corresponding norms of the Ukrainian criminal procedure law. Certain discrepancies relate to the content of the report examination part – in some countries it does not contain a detailed description of the research course. In addition, according to Art. 242 of the Criminal Procedure Code of Ukraine, a defense can independently engage a forensic expert, therefore, Art. 102 needs improvement. And since the defense party is not endowed with the right to warn a forensic expert about responsibility for a knowingly false report and refusal without valid reasons to fulfill duties assigned to him, then the indicated norm must be supplemented for such cases – in the aspect of the forensic expert awareness on such responsibility. It is specified that the body (person) that appoints the forensic structural engineering  examination does not always ask a forensic expert questions within the framework of the subject of proof. Admissibility of evidence is primarily determined by its receipt based on compliance with law. The grounds are provided that may serve as a reason for accepting the forensic report as inadmissible evidence in the field of forensic structural engineering.


2020 ◽  
Vol 3 (2) ◽  
pp. 350-359
Author(s):  
Jorico Lavianchandra ◽  
Alpi Sahari ◽  
Ahmad Fauzi

The issuance of law number 4 of 2009 concerning mineral and coal mining provides a new authority in the world of the act does not close the gap of illegal mining which is rife in Indonesia. Although the law already exists, the fact is that mining without permits continues. This study aims to determine the forms of non-criminal illegal mining and accountability. Forms of illegal mining are criinal acts of mining without permission either UIP, IPR or IUPK. Criminal offenses submit false report data, criminal offenses of exploration without rights, criminal offenses as holders of UIP exploration without carrying out production operations activities, criminal acts of laundering mining goods, criminal offenses related to abuse of authority of the official of the licensing authority, criminal acts which is a legal entity. The criminal liability against companies that carry aut mining activities without a permit is by imprisonment and with a criminal fine. Besides that the leablity for companies that conduct mining with civi sanctions and also administrative sanctions by way of making a business.


Recently, the range of applications for wireless sensor networks has grown. In industrial applications using data-driven approaches, data reliability is particularly important. However, deployed sensor nodes can be easily damaged due to physical damage or node acquisition factors caused by attackers, and false report injection attacks may occur. CFFS with collaborative verification has been proposed to filter out false reports. The proposed CFFS reduces the probability of a successful attack by separating sensor nodes into clusters. The false report filtering performance in the existing scheme is determined according to the pre-security strength setting. Unfortunately, with CFFS, it is impossible to secure each cluster because multiple attacks in a region are not considered. DCFFS uses fuzzy logic to enable security management for each cluster in consideration of the network environment and the geographical arrangement of the nodes. It is necessary for a network administrator to adjust the scope of the membership function parameter to fit the network environment to ensure that the output has an appropriate security strength value for the environment; however, this is difficult to know because it has dissimilar optimum ranges for each application. This paper introduces a fuzzy optimization method that can be adapted to various environments using a genetic algorithm in CFFS. The energy efficiency of nodes is increased by correcting the scope of the membership function in the proposed method. We used experiments to verify that the energy efficiency of the proposed scheme is increased, as compared to the existing scheme.


2020 ◽  
Vol 9 (2) ◽  
pp. 1126-1131

Fine dust is a harmful particulate substance floating in the air and is divided into PM10 (which is 10 um in diameter or less) and PM2.5 (which is 2.5 um in diameter or less). Fine dust is a major cause of chronic respiratory diseases, which may occur naturally through forest fires or yellow dust, but it is mainly caused by combustion of fossil fuels such as oil and coal, or by automobile exhaust gases. When this type of bad outdoor fine dust flows into buildings, the indoor air becomes polluted, making it easier for workers or students who spend a lot of time indoors to be at risk for chronic respiratory diseases. To minimize this risk, recent research and development has focused on systems to purify indoor air by filtering fine dust. In this paper, we introduce a Wireless Sensor Networks (WSNs)-based Internet of Things (IoT) air purification system. In the WSNs-based IoT air purification system, it is important to maintain the integrity of the sensing data because the IoT air purifier operates based on the sensing data detected by sensor nodes. To defend the IoT air purifier against false report injection attacks, the existing fuzzy-based Interleaved Hop-by-Hop Authentication (IHA) detects false report injection attacks through Data Calibration. In addition to the existing fuzzy-based IHA sets, the security limit changes according to the network situation using fuzzy logic and adjusts the security and energy. However, the existing fuzzy-based IHA executes a fuzzy system every time it detects a normal event or false report injection attack, which requires additional message overhead and increases the transmission/reception energy, which increases the energy burden of the sensor nodes. To address this problem, we propose a method to control the operation cycle of the fuzzy system using the evaluation function. This proposed method has the advantage that the trade-off relationship between energy and security can be appropriately used to adjust the operation cycle and increase the lifetime of the network.


A wireless sensor network (WSN) consists of sensor nodes with low cost and limited performance. The energy needed for node management is important because it is difficult to manage the deployed nodes. Several traditional security protocols prevent several known attacks in WSNs, such as s false report injection attack. However, the traditional protocols do not consider the false traffic ratio and geographical environment factors. Therefore, to extend the network lifetime, a new design is needed that maintains security and considers environmental factors. This paper introduces a method to increase the energy efficiency and increase the detection rate of false reports by adjusting the security strength of the report generated at the node according to the node density and geographical location. The proposed method has the advantage that it can be applied to various security protocols based on Message Authentication Code (MAC).


Author(s):  
Jessica R. Valdez

Newspapers are constantly lying in the worlds of Victorian novels, from the false report of John Harmon’s death in Our Mutual Friend (1864-1865) to allegations of extramarital affairs in Phineas Finn (1867-1868). Yet characters continue to believe what they read in the newspaper, assuming that news must be recent, relevant, and true. Victorian novels thus explore the contradictory logic of news: claims to journalistic reality sit uneasily alongside unrepresentative, malicious, or even false news. This book argues that nineteenth-century novels analysed the formal and social workings of news through a shifting series of metaphors, analogies, and plots. By incorporating newspapers and news discourse into their narratives, Victorian novels experimented with the ways that generic and formal qualities might reshape communal and national imaginings. This book shows that novelists often responded to newspapers by reworking well-known events covered by Victorian newspapers in their fictions. Each chapter addresses a different narrative modality and its relationship to the news: Charles Dickens interrogates the distinctions between fictional and journalistic storytelling, while Anthony Trollope explores novelistic bildung in serial form; the sensation novels of Wilkie Collins and Mary Elizabeth Braddon locate melodrama in realist discourses, whereas Anglo-Jewish writer Israel Zangwill represents a hybrid minority experience. At the core of these metaphors and narrative forms is a theorisation of the newspaper’s influence on society.


Sign in / Sign up

Export Citation Format

Share Document